1. Third generation of firewall offers_ to prevent web fingerprint attacks. stateful filter packet filter web application firewall none of them 2. The identity management system binds logical addresses to for reputed servers. specific programs other computers none of them mac address 3. First general firewalls operated at layer of the OSI model. 3 5 7 4 4. Connection to the Internet requires enforcement of security. low no zero high 5. Second general firewalls operated at layer of the OSI model. 3 4 5 7 6. Internet is constituted of . dvd pen drive network of networks hard disk 7. IP address helps to a computer connected to a network. format uniquely identify reject reset 8. Most of the wired network connections use . usb cable hard drive pen drive optical fibre cable (ofc) 9. Filtering connections and disallowing prohibited connections is carried out using . firewall router modem bridge 10. Fibre optic cables are interferences from electric cables and electromagnetic waves. susceptible to affected by unaffected by prone to 11. The port for connecting broadband cable to a computer is called . both ethernet port and ethernet port none of them registered jack 45 (rj-45) ethernet port 12. Wireless networks communicate using signal instead of cables. all of them low frequency radio wave infrared wireless fidelity (wifi - ieee 802.11 standard) 13. Routers help in . connecting different devices using appropriate protocol neithertransmission of data between networks & connecting different devices using appropriate protocol transmission of data between networks both transmission of data between networks & connecting different devices using appropriate protocol 14. Computers and devices can be connected using technology to create a network. both wired & wireless wireless neither wired & wireless wired 15. Wireless network connections use technologies. neither wireless fidelity (wifi) & bluetooth bluetooth both wireless fidelity (wifi) & bluetooth wireless fidelity (wifi) 16. Port number on a computer host connected to a network denotes a . none of them background server program both background server program & client program client program 17. A program which runs in the background and sends results requested by a client is called a . ip address client server port 18. The address 2001:db8:a0b:12f0::1 is formatted in . ipv4 ipv6 ipv2 ipv0 19. Firewall can . both deny access to specific sites & allow access to only white listed sites allow access to only white listed sites deny access to specific sites none of them 20. The device which connects one Local Area Network to another Local Area Network is called bridge switch hub modem 21. In the modern days, is the best choice for wireless networking. radio waves micro-wave wifi infrared 22. Wireless networks are wired networks. none of them slower than as fast as faster than 23. A cable with single copper core and braided metal shield is called . unshielded twisted cable shielded twisted cable fibre optic cable coaxial cable 24. In terms of data safety, wireless networks are wired networks. less secure than more secure than as safe as none of them 25. Bluetooth permits . pairing by password authentication all of them pairing by acceptance pairing by verification 26. is the version of Internet Protocol now being phased out. ip version 4 (ipv4) ip version 1 (ipv1) ip version 2 (ipv2) ip version 6 (ipv6) 27. IPV4 addresses have a by numeric address. 4 8 16 6 28. TCP/IP port number 69 is assigned for . file transfer protocol protocol (ftp) simple mail transfer protocol (smtp) trivial file transfer protocol (tftp) telnet 29. In a client server network, the ports in the range of 0 to 1023 are called ports. user ports relational ports general ports well known ports 30. Network protocols are standardized through . telnet email web server request for comment (rfc) 31. TCP/IP port number 119/ 443 is assigned for . network news transfer protocol (nntp) hyper text transfer protocol (http) structured query language (sql) post office protocol (pop) 32. UDP stands for . user datagram protocol user digital protocol user datagram procedure unified datagram protocol 33. TCP/IP port number 20 is assigned for . simple mail transfer protocol (smtp) trivial file transfer protocol (tftp) telnet file transfer protocol protocol (ftp) 34. TCP/IP port number 23 is assigned for . simple mail transfer protocol (smtp) telnet file transfer protocol protocol (ftp) trivial file transfer protocol (tftp) 35. TCP/IP port number 80 is assigned for . hyper text transfer protocol (http) post office protocol (pop) structured query language (sql) network news transfer protocol (nntp) 36. TCP/IP port number 25 is assigned for . file transfer protocol protocol (ftp) telnet simple mail transfer protocol (smtp) trivial file transfer protocol (tftp) 37. TCP/IP port number 109 is assigned for . post office protocol (pop) hyper text transfer protocol (http) network news transfer protocol (nntp) structured query language (sql) 38. The FTP server which does not require login process is called . anonymous file transfer protocol simple mail transfer protocol network time protocol hyper text transmission protocol 39. TCP/IP port number 118/ 156 is assigned for . structured query language (sql) hyper text transfer protocol (http) post office protocol (pop) network news transfer protocol (nntp) 40. TCP/IP port number 143/ 220 is assigned for . simple network management protocol (snmp) internet message access protocol (imap) internet relay chat (irc) precision time protocol (ptp) 41. TCP/IP port number 443 is assigned for . http over secure socket layer https remote procedure call (rpc) internet message access protocol over secure socket layer (imaps) dynamic host configuration protocol (dhcp) 42. TCP/IP port number 530 is assigned for . dynamic host configuration protocol (dhcp) remote procedure call (rpc) http over secure socket layer https internet message access protocol over secure socket layer (imaps) 43. TCP/IP port number 161 is assigned for . simple network management protocol (snmp) internet relay chat (irc) precision time protocol (ptp) internet message access protocol (imap) 44. Using FTP, a file can be copied from remote system to the local system using the command . cd lcd put get 45. RFC in networking stands for . request for contest rejection for comment request freight comment request for comment 46. TCP/IP port number 546/ 547 is assigned for . http over secure socket layer https remote procedure call (rpc) internet message access protocol over secure socket layer (imaps) dynamic host configuration protocol (dhcp) 47. allows for mapping IP address to an ethernet or hardware address. address resolution protocol (arp) none of them reverse address resolution protocol (rarp) open system interconnection (osi) 48. TCP/IP port number 993 is assigned for . dynamic host configuration protocol (dhcp) http over secure socket layer https remote procedure call (rpc) internet message access protocol over secure socket layer (imaps) 49. Using FTP, working directory on the local host can be changed using the command . lcd pwd cd bye 50. Usually, telnet connection is established using command followed by name of host. telnet ping ftp ls Submit Answers Retake Test More Computer Science Engineering Study Material › Computer Science Engineering Mock Tests with Answers Distributed Computing System Mock Test Software Project Management Mock TestArtificial Intelligence and Robotics Mock TestBasics of Database Management Mock TestC# Programming Mock TestC#.NET Programming Mock TestCloud Computing Mock TestCommunication Network Mock TestComputer Architecture Mock TestComputer Architecture and Organization Mock TestComputer Fundamentals Mock TestComputer Networking Mock TestComputer Networks Mock TestCPP Programming Mock TestData Analysis Mock TestData Communication and Computer Network Mock TestData Compression and Data Retrieval Mock TestData Mining and Business Intelligence Mock TestData Mining and Data Warehouse Mock TestData Structure and Algorithms Mock TestData Structures Mock TestDataBase Management System Mock TestDesign and Analysis of Algorithms Mock TestDigital Electronics and Logic Design Mock TestDigital Logic Circuits Mock TestDigital Principles and System Design Mock TestDiscrete Mathematics Mock TestDiscrete Structure Mock TestDotNet Technology Mock TestEmbedded Real Time Operating System Mock TestGreen Computing Mock TestHigh Performance Computing Mock TestInformation Cyber Security Mock TestInformation and Network Security Mock TestInformation Retrival Techniques Mock TestInformation Systems and Engineering Economics Mock TestMachine Learning Mock TestMicroprocessor and Interfacing Technique Mock TestMicroprocessors Mock TestMuli core Architectures and Pro Mock TestMulti core processors Mock TestNetwork Security Mock TestNeural Networks and Fuzzy Control Object Oriented Programming Mock TestOperating System Architecture Mock TestOperating System Mock TestProblem Solving and Python Programming Mock TestProgramming for Problem Solving Mock TestPython Programming Mock TestSoft Computing Mock TestSoftware Design Modeling Mock TestSoftware Engineering Mock TestSoftware Testing Mock TestSoftware Testing and Quality Assurance Mock TestTheory of Computation and Compiler Design Mock TestTheory of Computation Mock TestUbiquitous Computing System Mock Test Computer Science Engineering Mock Tests